dcsimg
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
Search the Tips
Tip Bank > Security

Security

Authentication
Encryption
Java
Password Management
SQL Server
Systems Administration
Visual Basic
1-20 of 5177     Previous     Next
Using fn_builtin_permissions
by Hannes Du Preez
Language: SQL, Expertise: Intermediate - Learn more about an SQL function that allows you to get a list of available permissions.
Employing DROP USER in MySQL
by M S Sridhar
Language: SQL, Expertise: Intermediate - Learn to how to properly use the drop user command in MySQL.
Creating a Secure Socket
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to secure your socket with encryption so that it is not an easy target for an attacker.
Knowing the Privileges of the Current User in MySQL
by Sridhar M S
Language: SQL, Expertise: Intermediate - See how to figure out what privileges users have in MySQL.
Find the TLS Version a Vendor Supports
by Srinath M S
Language: Enterprise, Expertise: Intermediate - Learn how to figure out which version of TLS is supported by a vendor.
Handy Function to Test for Email Validity
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Use this nifty function to check the validity of an email address.
Ascertain Whether or Not TLS 1.2 Is Enabled on a Server
by Srinath M S
Language: Security, Expertise: Intermediate - Learn a quick way to figure out if TLS 1.2 is enabled or not.
Secure Your Data in SQL 2016 with Row Level Security (RLS)
by Srinath M S
Language: SQL, Expertise: Advanced - Learn to implement restrictions on data row access in SQL 2016.
How to Turn on TLS Versions Without Affecting Earlier Versions
by Srinath M S
Language: .NET, Level: Advanced: - Learn how to configure the ServicePointManager to turn on the TLS version you want without affecting other versions.
Catching to Log in Java
by Octavia Anghel
Language: Java, Level: Beginner: - See why it is important to pass all required information along in the exception.
Decrypt HTTPS Traffic in Fiddler
by Srinath M S
Language: Enterprise, Expertise: Intermediate - See how to decrypt HTTPS traffic with Fiddler.
Do not Allow Critical Data to be Serialized
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn how to use the transient keyword for the variable that you do not want to be serialized.
Testing for String Equality
by Octavia Anghel
Language: Java, Expertise: Beginner See an example of the best way to check for string equality.
Change the Default TLS Version in .NET
by Srinath M S
Language: .NET, Expertise: Advanced - Learn a simple way to override the default security protocol used in .NET.
Enable TLS 1.2 Through PowerShell
by Srinath M S
Language: Security, Expertise: Advanced - Use the following script to enable TLS 1.2 on a server using PowerShell.
Block and Unblock Internet Access on a User's Computer Using C#
by Hannes du Preez
Language: .NET, Expertise: Intermediate - Control Internet connectivity on a user's PC via C#.
Get a User that has Deleted Rows with SQL
by Hannes du Preez
Language: SQL, Expertise: Intermediate - Finding a user who has deleted rows is a multi-part process. Get some tips on how to get it done.
Making a File Read-only Using Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Explore how the setReadOnly() method works in Java.
Performing Basic Validation with the Error Provider Control in C#
by Hannes du Preez
Language: .NET, Expertise: Beginner - See why the ErrorProvider control is quite useful when it comes to user input validation.
Tools that Highlight the Performance of the W3af Web Application Security Scanner
by Octavia Anghel
Language: Web, Expertise: Intermediate - Explore the most useful tools that work in association with the w3af web application security scanner.
1-20 of 5177     Previous     Next
Thanks for your registration, follow us on our social networks to keep up-to-date